An application using role-based access control model

被引:0
|
作者
Wang, G [1 ]
Cong, B [1 ]
Chen, N [1 ]
Lan, M [1 ]
Yan, HT [1 ]
机构
[1] Calif State Univ Fullerton, Fullerton, CA 92634 USA
关键词
distributed banking system; system security; user access; Role-Based Access Model;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The task of managing users' accesses to a system can be difficult, error-prone, and costly to a security administrator. Most of the time, this task is accomplished by directly associating users with permissions. In the banking industry, three software programs, EXIMBILL, FEDLINE and SWIFT, are used for the daily operation transactions such as letter of credit, loan payment, accounting, and money transfer. Even though each one deals security issue in different way, they all have same problem that permissions are directly related to users. In this paper; we consider to solve this common problem by implementing a new model based on the recently proposed Role-Based Access Model.
引用
收藏
页码:369 / 375
页数:7
相关论文
共 50 条
  • [21] A generalized temporal role-based access control model
    Joshi, JBD
    Bertino, E
    Latif, U
    Ghafoor, A
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2005, 17 (01) : 4 - 23
  • [22] A role-based multilevel security access control model
    Pan, L
    Zhang, CN
    Yang, CG
    [J]. JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2006, 46 (03) : 1 - 10
  • [23] An improved Role-based workflow Access Control Model
    Zhao, Hui
    Fang, Zhiyi
    Xu, Peng
    Zhao, Lianyu
    Liu, Jin
    Wang, Tianyang
    [J]. PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2008, : 551 - 556
  • [24] A role-based access control model for XML repositories
    He, H
    Wong, RK
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS ENGINEERING, VOL I, 2000, : 138 - 145
  • [25] Role-based Access Control Model for Multicast in MANET
    Mu Haibing
    Zhang Changlun
    Zeng Ping
    [J]. ICCSE 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION: ADVANCED COMPUTER TECHNOLOGY, NEW EDUCATION, 2008, : 816 - 819
  • [26] Role-based access control and the access control matrix
    Saunders, G
    Hitchens, M
    Varadharajan, V
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 145 - 157
  • [27] Role-based access control on the web using LDAP
    Park, JS
    Ahn, GJ
    Sandhu, R
    [J]. DATABASE AND APPLICATION SECURITY XV, 2002, 87 : 19 - 30
  • [28] Role-based access control using neural network
    Chae, SH
    Kim, W
    Kim, DK
    [J]. 7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING, 2003, : 36 - 40
  • [29] Using NFS to implement role-based access control
    Gustafsson, M
    Deligny, B
    Shahmehri, N
    [J]. SIXTH IEEE WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 1997, : 299 - 304
  • [30] Role-Based Access Control and the Access Control Matrix
    Saunders, G.
    Hitchens, M.
    Varadharajan, V.
    [J]. 2001, Association for Computing Machinery (35):